• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
Broken
The Monospace Web
https://owickstrom.github.io/the-monospace-web/
 
design web
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Honest Trailers | The Lord of the Rings: The Two Towers
https://www.youtube.com/watch?v=h5CtjDLvUVk

Look’s like meat’s back on the menu, boys! Because next up in the trilogy is The Lord of The Rings: The Two Towers: The Extended Edition: The Honest Trailer!...

 
funny movies youtube
Added 2 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
15 open-source cybersecurity tools you'll wish you'd known earlier - Help N
https://www.helpnetsecurity.com/2024/01/04/open-source-cybersecurity-tools/

In this article, you will find a list of open source cybersecurity tools that you'll wish you'd known earlier.

 
open source security tools
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
How much of my observability data is waste?
https://usetero.com/blog/the-question-your-observability-vendor-wont-answer

After a decade in observability, I kept bumping into one question no vendor would answer: how much of your data is waste?

 
data hackernews observability
Added 2 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://github.com/ayang64/doomfire
https://github.com/ayang64/doomfire

Contribute to ayang64/doomfire development by creating an account on GitHub.

 
doom games
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
10 Weird Facts About The Goodies You Never Knew! - YouTube
https://youtu.be/93sKWN2zv38?si=a3q2hbFdeUeWOCk4

🎥 Step inside the surreal world of The Goodies, where chaos became genius and three madmen turned television upside down. Discover the wild stunts, secret d...

 
funny history
Added 2 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
SSH Bastion Host Best Practices
https://goteleport.com/blog/security-hardening-ssh-bastion-best-practices/
 
security ssh
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
The CVE program for tracking security flaws is about to lose federal funding
https://www.theverge.com/news/649314/cve-mitre-funding-vulnerabilities-exposures-funding

The federally funded organization behind the Common Vulnerabilities and Exposures (CVE) program confirmed that its contract to support the system will expire on April 16th.

 
cyber security
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
6-Day and IP Address Certificates Are Generally Available
https://letsencrypt.org/2026/01/15/6day-and-ip-general-availability

Short-lived and IP address certificates are now generally available from Let’s Encrypt. These certificates are valid for 160 hours, just over six days. In order to get a short-lived certificate subscribers simply need to select the ‘shortlived’ certificate profile in their ACME client. Short-lived certificates improve security by requiring more frequent validation and reducing reliance on unreliable revocation mechanisms. If a certificate’s private key is exposed or compromised, revocation has historically been the way to mitigate damage prior to the certificate’s expiration. Unfortunately, revocation is an unreliable system so many relying parties continue to be vulnerable until the certificate expires, a period as long as 90 days. With short-lived certificates that vulnerability window is greatly reduced.

 
certificates hackernews
Added 2 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/introducing-the-aws-security-incident-response-whitepaper/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_incident_response_whitepaper_TWITTER&sc_content=security_blog_incident_response_whitepaper&linkId=69462957
https://aws.amazon.com/blogs/security/introducing-the-aws-security-incident-response-whitepaper/?sc_channel=sm&sc_campaign=AWSSecurity_Blog&sc_publisher=TWITTER&sc_country=Security+%26+Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=security_blog_incident_response_whitepaper_TWITTER&sc_content=security_blog_incident_response_whitepaper&linkId=69462957

April 25, 2023: We’ve updated this blog post to include more security learning resources. AWS recently released the AWS Security Incident Response whitepaper, to help you understand the fundamentals of responding to security incidents within your cloud environment. The whitepaper reviews how to prepare your organization for detecting and responding to security incidents, explores the […]

 
aws security whitepaper
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://www.helpnetsecurity.com/2024/08/08/sshamble-test-ssh-services/
https://www.helpnetsecurity.com/2024/08/08/sshamble-test-ssh-services/

SSHamble helps security teams validate SSH implementations and test for uncommon but dangerous misconfigurations and software bugs.

 
open source security ssh testing
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Useful Git Tips and Commands - THE CURIOUS DEVELOPER
https://thecuriousdev.org/useful-git-tips-commands/
 
development git revision tips
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Introduction | asdf
https://asdf-vm.com/guide/introduction.html

Manage multiple runtime versions with a single CLI tool

 
management tools versions
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Managing Windows server DNS records from Linux commandline | Hexblot's Abod
http://www.hexblot.com/blog/managing-windows-server-dns-records-linux-commandline
 
active direcotry dns unix
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Did Semgrep Just Get A Lot More Interesting? · The Fly Blog
https://fly.io/blog/semgrep-but-for-real-now/

Documentation and guides from the team at Fly.io.

 
ai application security llm
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Claudeskills.cc – Share, Discover, and Reuse Claude/OpenAI Agent Skills
https://claudeskills.cc

Design, test, and distribute Agent Skills with reusable templates, collaborative reviews, and multi-surface deployment.

 
ai claude code hackernews llm
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
These are the 15 best open source Android games you need to try
https://www.androidauthority.com/best-open-source-android-games-3571204/

There are plenty of incredible open source Android games available for your smartphone, but to get your started, here are my favorites.

 
games mobile open source
Added 6 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://twitter.com/danielepolencic/status/1267745860256841731
https://twitter.com/danielepolencic/status/1267745860256841731
 
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The Control Plane for Agentic Identity
https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/

Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]

 
pentest security vulnerability
Added 5 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://www.brighttalk.com/webcast/8901/324107/dos-and-don-ts-for-devops-automation-on-aws
https://www.brighttalk.com/webcast/8901/324107/dos-and-don-ts-for-devops-automation-on-aws
 
aws devops
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
Critical doomsday Linux bug is CUPS-based vulnerability • The Register
https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/

No patches yet, can be mitigated, requires user interaction

 
cyber linux security vulnerability
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Broken
https://aws.amazon.com/blogs/security/how-to-encrypt-and-decrypt-your-data-with-the-aws-encryption-cli/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsencryptioncli&sc_category=AWS_Identity_and_Access_Management&linkId=44937334
https://aws.amazon.com/blogs/security/how-to-encrypt-and-decrypt-your-data-with-the-aws-encryption-cli/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=awsencryptioncli&sc_category=AWS_Identity_and_Access_Management&linkId=44937334

August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info You can now encrypt and decrypt your data at the command line and in scripts—no […]

 
Added 8 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Do not download the app, use the website
https://idiallo.com/blog/dont-download-apps

Apps often demand excessive permissions, accessing your contacts, location, and more. Discover why sticking to your browser offers better privacy and control.

 
data mobile privacy
Added 6 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Notion AI: Unpatched data exfiltration
https://www.promptarmor.com/resources/notion-ai-unpatched-data-exfiltration

Notion AI is susceptible to data exfiltration via indirect prompt injection due to a vulnerability in which AI document edits are saved before user approval.

 
hackernews
Added 3 weeks ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 59
  • 60
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks